CVE-2025-27888

Apache Druid: Server-Side Request Forgery and Cross-Site Scripting

Description

Severity: medium (5.8) / important Server-Side Request Forgery (SSRF), Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting'), URL Redirection to Untrusted Site ('Open Redirect') vulnerability in Apache Druid. This issue affects all previous Druid versions. When using the Druid management proxy, a request that has a specially crafted URL could be used to redirect the request to an arbitrary server instead. This has the potential for XSS or XSRF. The user is required to be authenticated for this exploit. The management proxy is enabled in Druid's out-of-box configuration. It may be disabled to mitigate this vulnerability. If the management proxy is disabled, some web console features will not work properly, but core functionality is unaffected. Users are recommended to upgrade to Druid 31.0.2 or Druid 32.0.1, which fixes the issue.

Category

5.8
CVSS
Severity: Medium
CVSS 4.0 •
EPSS 0.04%
Vendor Advisory apache.org
Affected: Apache Software Foundation Apache Druid
Published at:
Updated at:

References

Frequently Asked Questions

What is the severity of CVE-2025-27888?
CVE-2025-27888 has been scored as a medium severity vulnerability.
How to fix CVE-2025-27888?
To fix CVE-2025-27888, make sure you are using an up-to-date version of the affected component(s) by checking the vendor release notes. As for now, there are no other specific guidelines available.
Is CVE-2025-27888 being actively exploited in the wild?
As for now, there are no information to confirm that CVE-2025-27888 is being actively exploited. According to its EPSS score, there is a ~0% probability that this vulnerability will be exploited by malicious actors in the next 30 days.
What software or system is affected by CVE-2025-27888?
CVE-2025-27888 affects Apache Software Foundation Apache Druid.
This platform uses data from the NIST NVD, MITRE CVE, MITRE CWE, First.org and CISA KEV but is not endorsed or certified by these entities. CVE is a registred trademark of the MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. CWE is a registred trademark of the MITRE Corporation and the authoritative source of CWE content is MITRE's CWE web site.
© 2025 Under My Watch. All Rights Reserved.